-
cryptogrampy[m]
<ofrnxmr[m]> "--rpc-access-control-origins=*" <- this, and httpS or Tor
-
cryptogrampy[m]
* or Tor Hidden Service
-
ofrnxmr[m]
Right right, almost forgot :P, `--rpc-access-control-origins=*`
-
ofrnxmr[m]
And need to use rpc over https or an onion
-
ofrnxmr[m]
-
cryptogrampy[m]
-
plowsof11
"be https" :(
-
plowsof11
"know things" :'(
-
cryptogrampy[m]
-
cryptogrampy[m]
imagine using a non-encrypted traffic public monero node
-
cryptogrampy[m]
on the nursing home wifi
-
cockliuser[m]
don't use caddy btw
-
ofrnxmr[m]
Please elaborate
-
cockliuser[m]
it's shit, i've used it
-
cockliuser[m]
bloated http server that runs as root
-
Siren[m]
It doesn't run as root
-
Siren[m]
You're doing something wrong
-
Siren[m]
It's not shit, it's way better than nginx or apache
-
Siren[m]
Also less bloated than nginx for sure
-
cockliuser[m]
caddy is absolute shit
-
Siren[m]
You don't even know how to install it :D
-
cockliuser[m]
it does run as rooy
-
cockliuser[m]
*root
-
Siren[m]
It doesn't
-
XMRPriest[m]
Has anyone compiled the source code to run a node
-
-
XMRPriest[m]
During my compilation, got an error about a file, anyone know how to fix it ?
-
cockliuser[m]
<Siren[m]> "Also less bloated than nginx for..." <- equating lemons to oranges
-
cockliuser[m]
nginx is a proxy, reverse balancer, and a bunch of other stuff
-
cockliuser[m]
while caddy is supposed to be a http server with https support
-
cockliuser[m]
stunnel will work for a server that wants https
-
cockliuser[m]
<Siren[m]> "It doesn't..." <- ahahahaha
-
ofrnxmr[m]
<XMRPriest[m]> "During my compilation, got an..." <- Use gitian or depends build
-
ofrnxmr[m]
Build instructions are meant for Ubuntu 18.04 or 20.04, not debian
-
cockliuser[m]
-
cockliuser[m]
Hahaha
-
ofrnxmr[m]
Haha
-
ofrnxmr[m]
-
ofrnxmr[m]
Quick glance over appears that deescalation is possible simply by not running as root, as you would any other go program
-
ofrnxmr[m]
Disclaimer: I didnt read it, just scanned over quickly
-
cockliuser[m]
You still need to bind to privileged ports
-
cockliuser[m]
Can't do that without root+de-escalation
-
cockliuser[m]
You can't serve tls over port 6969 after all
-
xmrfn[m]
Seriously why not just use nginx? Is this a particular usecase?
-
cockliuser[m]
xmrfn[m]: you can but why
-
xmrfn[m]
Well he seemed to want an http server for some reason
-
cockliuser[m]
oh I thought we were talking about adding https to monero nodes
-
xmrfn[m]
yipes why add the attack surface
-
xmrfn[m]
and attention / constant attacks
-
cockliuser[m]
how is it an attack surface though?
-
cockliuser[m]
aren't monerod nodes http
-
xmrfn[m]
every port we parse is
-
xmrfn[m]
well yes they do http
-
cockliuser[m]
xmrfn[m]: true but https support with a reverse proxy is seen as http by the server
-
xmrfn[m]
OIC, for https support
-
cockliuser[m]
yeah
-
Torr
Ahoy
-
cockliuser[m]
dero people have been shitting on xmr on twitter
-
xmrfn[m]
why do you bother giving attention to trolls
-
cockliuser[m]
They misinform users with FUD
-
Mochi101
Monero will never recover from it.
-
cockliuser[m]
yeah, their outreach is limited but some people get taken in by it
-
xmrfn[m]
I know. Crypto "investors" :/
-
cockliuser[m]
It's a scam coin mostly fueled by speculation and they talk about liquidity lol
-
xmrfn[m]
Monero's biggest problem is its association with Crypto
-
xmrfn[m]
... which has come to by synonymous with NFTs, "staking", scams, and Bitcoin-which-nobody-uses-and-isn't-different-from-Venmo-or-ApplePay-anyway
-
xmrfn[m]
s/by/be/
-
cockliuser[m]
Yeah
-
xmrfn[m]
As for https... TBH if the node is on a dedicated box, it's easier to go whole hog and serve it thru Tor
-
cockliuser[m]
TOR has one problem though
-
cockliuser[m]
It's very slow
-
xmrfn[m]
That is one of its problems
-
cockliuser[m]
Yeah
-
cockliuser[m]
stunnel is very useful though
-
cockliuser[m]
* very useful in case of https though
-
cockliuser[m]
btw how do message edits appear on the irc
-
xmrfn[m]
OTOH if you're connecting to a Monero node, those are all known/discoverable IP addresses, and the information you exchange with them is 100% public, nothing personal to be gained. So HTTPS is buying you very little. Why encrypt the traffic?
-
ofrnxmr[m]
<cockliuser[m]> "dero people have been shitting..." <- Who?
-
xmrfn[m]
ugh, see, don't feed the trolls
-
ofrnxmr[m]
Im joking
-
ofrnxmr[m]
They blocked me
-
ofrnxmr[m]
Captain and his goonies tried to pick a fight with me and got slapped by 19 different people, then stfu about monero for 6 months
-
xmrfn[m]
Hey I didn't know about stunnel -- yes that looks like the perfect tool for the job
-
ofrnxmr[m]
Now they are waiting for us to respond, so they can call us bullies
-
Siren[m]
<cockliuser[m]> "
bugs.freebsd.org..." <- Ever used an init system?
-
-
apotheon
03:52 < cockliuser[m]> stunnel is very useful though
-
apotheon
03:52 < cockliuser[m]> * very useful in case of https though
-
apotheon
03:52 < cockliuser[m]> btw how do message edits appear on the irc
-
apotheon
like that, I guess
-
apotheon
ofrnxmr[m]: Are you actually talking to Dero people?
-
Siren[m]
<cockliuser[m]> "You can't serve tls over port 69..." <- Also wrong, you can
-
Siren[m]
<cockliuser[m]> "Can't do that without root+de-..." <- You gotta have an init system and it's now doing that for the rest of your services
-
Siren[m]
And that's normal
-
Siren[m]
<cockliuser[m]> "nginx is a proxy, reverse..." <- Both Caddy and Apache can proxy, reverse balance and do the bunch of other stuff. But yes I'm equating lemons to oranges. Nginx has some of its features made unavailable on purpose so you opt out for the paid version. If you don't want the paid version, you need to pull the nginx source + plugin source and take your time to compile and maintain those binaries. While xcaddy can do this in
-
Siren[m]
seconds. Sure a terminating proxy, not a HTTP server, like stunnel or hitch would work but I'm sure he enjoys the certificate management feature.
-
Siren[m]
<xmrfn[m]> "and attention / constant attacks" <- What do you think draws more attention? Monerod packets or HTTPS going over the network?
-
cockliuser[m]
<Siren[m]> "Also wrong, you can" <- Also wrong, you can
-
cockliuser[m]
Correction: You can serve tls over 6969 but no client will accept it
-
cockliuser[m]
<Siren[m]> "Both Caddy and Apache can proxy,..." <- Both Caddy and Apache can proxy, reverse balance and do the bunch of other stuff. But yes I'm equating lemons to oranges. Nginx has some of its features made unavailable on purpose so you opt out for the paid version. If you don't want the paid version, you need to pull the nginx source + plugin source and take your time to compile and maintain those binaries. While xcaddy can do this
-
cockliuser[m]
in seconds. Sure a terminating proxy, not a HTTP server, like stunnel or hitch would work but I'm sure he enjoys the certificate management feature.
-
cockliuser[m]
certificates can be managed by the letsencrypt utility
-
Siren[m]
Yes they will once you tell them the port
host:6969, that includes monero wallets.
-
Siren[m]
> <@cockliuser:matrix.org> Both Caddy and Apache can proxy, reverse balance and do the bunch of other stuff. But yes I'm equating lemons to oranges. Nginx has some of its features made unavailable on purpose so you opt out for the paid version. If you don't want the paid version, you need to pull the nginx source + plugin source and take your time to compile and maintain those binaries. While xcaddy can do this in seconds. Sure a terminating
-
Siren[m]
proxy, not a HTTP server, like stunnel or hitch would work but I'm sure he enjoys the certificate management feature.
-
Siren[m]
> certificates can be managed by the letsencrypt utility
-
Siren[m]
Let's encrypt is horrid
-
cockliuser[m]
Siren[m]: I don't think it will be web compatible
-
Siren[m]
Why not?
-
Siren[m]
-
cockliuser[m]
> <@siren:kernal.eu> > <@cockliuser:matrix.org> Both Caddy and Apache can proxy, reverse balance and do the bunch of other stuff. But yes I'm equating lemons to oranges. Nginx has some of its features made unavailable on purpose so you opt out for the paid version. If you don't want the paid version, you need to... (full message at <
libera.ems.host/_matrix/media/v3/do…d920a487206e5ea3859a9ce839ba42842d5>)
-
Siren[m]
Let's encrypt issues you certs? I guess you mean certbot?
-
cockliuser[m]
There was a utility to automatically manage Let's Encrypt certs for Linux
-
cockliuser[m]
don't remember the name tho
-
Siren[m]
Certbot is shit and you shouldn't use it. Acme.sh works better. But caddy cert handling works the best. You should avoid let's encrypt because of their stupid rate limits. ZeroSSL is way better and now most utilities default to it when issuing certs.
-
cockliuser[m]
Siren[m]: fair enough, but I'd rather not require a client to enter a port
-
Siren[m]
Ok? Then serve over 443.
-
Siren[m]
What's wrong? Your OS doesn't have caps?
-
Siren[m]
-
cockliuser[m]
Siren[m]: I'd rather not open another attack vector thank you
-
Siren[m]
Lmao that's access control, not an attack vector. When people packaging things for your to run as root, I'd rather quit using that OS.
-
Siren[m]
* for your OS to run
-
Siren[m]
<apotheon> "03:52 < cockliuser> stunnel is..." <-
hitch-tls.org
-
Siren[m]
* for your OS prefer things to run
-
Siren[m]
* for your OS prefer binaries to run
-
cockliuser[m]
Siren[m]: Yes it's access control, it's a workaround for something that shouldn't be an issue in the first place
-
Siren[m]
cockliuser[m]: Sure like MacOS you can get rid of this cockblock and not have privileged ports at all
-
cockliuser[m]
That's not the issue
-
cockliuser[m]
The issue is that caddy can't bind to the port and de escalate
-
Siren[m]
Ugh caddy doesn't need that
-
Siren[m]
Your init system does that, it's better this way
-
cockliuser[m]
-
cockliuser[m]
why use this over stunnel :)
-
Siren[m]
-
cockliuser[m]
Siren[m]: I use OpenBSD :)
-
apotheon
cockliuser[m]: Do you use the CLI wallet on OpenBSD?
-
Siren[m]
I thought you send a link from the freebsd bug tracker
-
Siren[m]
<cockliuser[m]> "
bugs.freebsd.org..." <- Yes you did
-
Siren[m]
cockliuser[m]: Also has caps
-
Siren[m]
> <@cockliuser:matrix.org>
hitch-tls.org
-
Siren[m]
> why use this over stunnel :)
-
Siren[m]
It works well.
-
cockliuser[m]
Atleast not a Linux-like cap system
-
cockliuser[m]
Openbsd does not have a Linux-like cap system
-
narodnik
gm
-
cockliuser[m]
> <@siren:kernal.eu> > <@cockliuser:matrix.org>
hitch-tls.org
-
cockliuser[m]
> why use this over stunnel :)
-
cockliuser[m]
It works well.
-
cockliuser[m]
stunnel works well too :)
-
Siren[m]
cockliuser[m]: So you're telling me you run all of your services as root?
-
Siren[m]
If that's the case caddy is the least of your problems
-
cockliuser[m]
Siren[m]: So you're telling me you run all of your services as root?
-
cockliuser[m]
what
-
cockliuser[m]
lol
-
cockliuser[m]
no, openbsd has much better privilege separation than linooox
-
Siren[m]
there are plenty of programs that cannot de-escalate
-
apotheon
Siren[m]: Services tend to run as limited service accounts.
-
Siren[m]
apotheon: Your init system does that using an API called capabilities.
-
Siren[m]
This guy is complaining why a program lacks the functionality to start as root and then de-escalate its own privileges later on
-
apotheon
There's more than one meaning of "capabilities" in a security permissions sense, and I only skimmed some of the discussion, so I wasn't sure what you meant.
-
cockliuser[m]
Siren[m]: lots of programs do
-
cockliuser[m]
especially servers
-
apotheon
I guess I misread, and shouldn't tryto participate if I haven't eavesdropped from the beginning.
-
apotheon
s/tryto/try to/
-
Siren[m]
apotheon: capabilities is literally the name of a feature that allows init systems to get binaries to use low numbered ports
-
Siren[m]
* numbered ports without root
-
apotheon
I know about that feature.
-
apotheon
Capabilities also refers to other things.
-
cockliuser[m]
cockliuser[m]: named for example
-
Siren[m]
<Siren[m]> "
man7.org/linux/man-pages..." <- I'm referring to this
-
cockliuser[m]
We know
-
cockliuser[m]
but as I said, a program shouldn't rely on that
-
Siren[m]
Should
-
cockliuser[m]
named dns server
-
cockliuser[m]
it drops all privileges other than bind
-
cockliuser[m]
many other servers do so
-
cockliuser[m]
there's no reason for caddy not to do so
-
Siren[m]
there's no reason for caddy to do that because init systems do this
-
apotheon
There are also many, widely varied implementations of capability security of the form that most commonly comes to mind when I hear the term: NIST SP 800-53, "security capabilities".
-
cockliuser[m]
On linux
-
apotheon
jeebus, your manpage link got truncated by the Matrix bridge
-
Siren[m]
cockliuser[m]: They don't need to care about adding that feature in just because of OpenBSD when the majority of users are on Linux. Also this is a Go program, fairly safe to run it as root. As the dev explained himself here
caddyserver/caddy #528#issuecomment-639716588
-
apotheon
hmm
-
apotheon
more people refusing to write portable code
-
apotheon
great
-
apotheon
"the majority of people who use it only use it on the OS we support" <- self-fulfilling prophecy
-
Siren[m]
apotheon: Seeing that freebsd bug tracker I'm convinced they're retarded
-
Siren[m]
I don't care
-
apotheon
I'm not sure who you're calling "retarded", but I've never used Caddy and I don't currently run FreeBSD on anything, so . . . not sure what's up with that.
-
Siren[m]
About caps, they have caps. I'm not sure if that allows them to allow access to high priv ports but if it doesn't that's again, retarded. They went out of their way to implement most of that.
-
cockliuser[m]
Siren[m]: Seeing that freebsd bug tracker I'm convinced they're retarded
-
cockliuser[m]
great attitude
-
Siren[m]
-
Siren[m]
they seriously live under a rock
-
Siren[m]
haven't bothered to check caddy docs nor how other OS package it
-
Siren[m]
would have given them a clue
-
cockliuser[m]
-
cockliuser[m]
what about this signals "lives under a rock"
-
cockliuser[m]
you seriously have a problem with your caddy evangelism
-
Siren[m]
-
Siren[m]
>
-
Siren[m]
> what about this signals "lives under a rock"
-
Siren[m]
"that a webserver should bind to its privileged ports (80, 443) first and then drop privileges. So this is really an upstream bug that should be reported to caddy. I will go on and report it there." This is not a bug
-
apotheon
Wow, that Caddy issue comment is kinda awful.
-
Siren[m]
cockliuser[m]: I'm just explaining things. You pinged me about 3 times and didn't seem to know about how you should run caddy and some other things about how other web servers work. That's about it.
-
apotheon
translation: "We won't fix it if it affects less than half the users, and we still won't if there isn't an actual exploit regardless of whether it's a real vulnerability, and even then we won't fix it unless you provide the fix."
-
Siren[m]
there's nothing to fix
-
cockliuser[m]
Siren[m]: I'm just explaining things. You pinged me about 3 times and didn't seem to know about how you should run caddy and some other things about how other web servers work. That's about it.
-
cockliuser[m]
named isn't a normal server then according to you, it's "retarded"
-
apotheon
Siren[m]: If that's true, then whatever, but the comment essentially means what I just said, so . . . it's still a fucking terrible comment.
-
Siren[m]
> <@cockliuser:matrix.org> I'm just explaining things. You pinged me about 3 times and didn't seem to know about how you should run caddy and some other things about how other web servers work. That's about it.
-
Siren[m]
>
-
Siren[m]
> named isn't a normal server then according to you, it's "retarded"
-
Siren[m]
While I prefer unbound, I was referring to the thread as retarded. Perhaps you should read it a bit more careful and stop shoving things onto my mouth.
-
cockliuser[m]
Expecting a server to de-escalate isn't "retarded" in any sense
-
apotheon
hm
-
apotheon
The FreeBSD bug thread seems pretty straightforward.
-
Siren[m]
Well guys the times have changed it looks like
-
apotheon
Okay, so it looks like the problem is the usual problem with security capabilities:
-
apotheon
No two OS kernels implement them the same way, and someone wrote nonportable code.
-
cockliuser[m]
That's part of it, but also there's a difference between using capabilities and de-escalation. They can be used together for more security, but a standalone de-escalated server is more secure than a server with the bind capability
-
apotheon
If that's not correct, it's because I'm not willing to spend too much time reading about this stuff to be sure, but that's how it looks.
-
apotheon
cockliuser[m]: Sure, there's that, too.
-
DanIsnotthemanBr
fighting over webservers?
-
apotheon
It'd be nice if everything used pledge and unveil, too.
-
apotheon
(as long as we're wishing)
-
Siren[m]
You know BSD devs are free to come over and implement the features they wish :D Same with caddy.
-
Siren[m]
Nothing written in the past few years supports de-escalation unless it specifically targets BSDs. This is purely up to the developer.
-
Siren[m]
Besides don't you have a firewall? Can't you simply forward the low priv port to 443?
-
cockliuser[m]
Siren[m]: named is linux software
-
cockliuser[m]
You're now making up FUD lol
-
apotheon
08:35 < Siren[m]> You know BSD devs are free to come over and implement the features they wish :D Same with caddy.
-
apotheon
Why?
-
apotheon
It's the Linux world that suffers for lack of that functionality.
-
Siren[m]
they want X feature, they can implement X feature
-
Siren[m]
as simple as that
-
apotheon
err
-
apotheon
Why would OpenBSD devs want pledge and unveil on an OS they may not even use?
-
Siren[m]
cockliuser[m]: emphasis on the **written in the past few years**
-
apotheon
"they want X feature"
-
apotheon
they already have it
-
apotheon
on OpenBSD
-
Siren[m]
apotheon: then they don't but if they really want de-escalation in a program where it isn't required, they should implement it themselves
-
cockliuser[m]
Siren[m]: Setuid setgid is also used on linux a lot
-
cockliuser[m]
A LOT
-
Siren[m]
I'm not talking about pledge and unveil
-
Siren[m]
apotheon: Well the BSD ecosystem is a dying, can't say the same about Linux
-
cockliuser[m]
ahahaha
-
Siren[m]
* a dying one, can't
-
apotheon
Siren[m]: You're saying they should implement security capabilities, which they've already done, so someone else can do something they do in a non-portable manner rather than doing it in a portable manner.
-
cockliuser[m]
siren, cap isn't as secure as privilege dropping
-
cockliuser[m]
With cap you still have the capability on the server
-
Siren[m]
apotheon: I'm saying that they should have looked up how to package it. It's meant to be used with capabilities. If they have that, they should use it. Otherwise they can use a firewall to forward the traffic. There's absolutely no need for caddy devs to implement this.
-
apotheon
Siren[m]: You said it following what I said about pledge and unveil, did not specify to whom you were responding, and replied about eight minutes after I mentioned pledge and unveil so you had plenty of time to notice you should specify what you meant to address.
-
cockliuser[m]
cockliuser[m]: With dropping you have no privileges left to the server
-
Stnby[m]
cockliuser: net.inet.ip.portrange.reservedhigh=0 or get a real OS
-
apotheon
Siren[m]: . . . so thanks for finally mentioning you weren't replying to what I said when you replied nonspecifically after what I said.
-
apotheon
Siren[m]: You seem to have ignored my earlier comment about how it's the same old problem as usual -- that every OS with a different kernel implements it differently.
-
cockliuser[m]
Stnby[m]: Imagine removing privileged ports entirely to run a bloated webserver
-
cockliuser[m]
Can't
-
apotheon
Security capabilities aren't a standard interface. They're just a standard set of toggles, implemented in a myriad of different ways.
-
Siren[m]
apotheon: While this discussion is mainly about de-escalation or caps. In general someone should implement the missing features that they want if it's niche enough. In the case of caddy, it is niche.
-
apotheon
It's so inconstant that people argue about what even qualifies as a security capability.
-
Stnby[m]
cockliuser[m]: Imagine having a nick that resembles a cock looser who attempts to run software on his Free BSD VM on a shiny Macbook.
-
Siren[m]
apotheon: Thought the message I sent right after saying that the BSD devs should implement some features themselves made it very clear. I said:
-
Siren[m]
"Nothing written in the past few years supports **de-escalation** unless it specifically targets BSDs. This is purely up to the developer."
-
cockliuser[m]
> <@siren:kernal.eu> Thought the message I sent right after saying that the BSD devs should implement some features themselves made it very clear. I said:
-
cockliuser[m]
> "Nothing written in the past few years supports **de-escalation** unless it specifically targets BSDs. This is purely up to the developer."
-
cockliuser[m]
Do you really think modern software doesn't use setuid?
-
cockliuser[m]
Or setgid
-
cockliuser[m]
Even programs that use cap drop the capability privilege
-
Siren[m]
<apotheon> "Siren: You seem to have ignored..." <- I'm aware that capabilities are not standard, never said they were
-
cockliuser[m]
<Siren[m]> "Nothing written in the past..." <- Citation or source?
-
cockliuser[m]
Or did you pull it out the shitter :D
-
Stnby[m]
cockliuser[m]: Get a real OS even your shitty macos has no low port limitation
-
cockliuser[m]
Stnby[m]: Privileged ports are standardized
-
Siren[m]
<cockliuser[m]> "Citation or source?" <- Myself, working devops in a large infra (~2k servers) and none of the servers run BSD. I don't have time to dig for you but doing a small amount of research should tell you about the state of BSD.
-
cockliuser[m]
Siren[m]: Myself, working devops in a large infra (~2k servers) and none of the servers run BSD. I don't have time to dig for you but doing a small amount of research should tell you about the state of BSD.
-
cockliuser[m]
lol
-
cockliuser[m]
did you read what you yourself said
-
cockliuser[m]
<Siren[m]> "Nothing written in the past..." <- .
-
cockliuser[m]
You don't understand how most setuid/setgid programs work with privileges do you
-
Siren[m]
You're intentionally misinterpreting my messages. What I mean in there is that programs now mostly depend on the init system for resources.
-
Siren[m]
this isn't about setuid/setgid
-
cockliuser[m]
Siren[m]: A program on bsd can use the init system for that, that's not the point
-
Siren[m]
cockliuser[m]: apparently it cannot, as it couldn't bind on 443 via init
-
cockliuser[m]
You can with a superuser
-
cockliuser[m]
Then drop privileges
-
Siren[m]
cockliuser[m]: you should share this knowledge with the freebsd devs, I'm sure they would appreciate it /s
-
Stnby[m]
running something as superuser is more secure than allowing low ports and begging as a regular users?
-
Stnby[m]
s/users/user/
-
cockliuser[m]
Siren[m]: The program needs to support it
-
Siren[m]
cockliuser[m]: it doesn't in your case and it won't
-
cockliuser[m]
Stnby[m]: Allowing a capability is not any more secure
-
Siren[m]
my point is that software doesn't get written for BSD and they mostly don't do that anymore
-
Stnby[m]
cockliuser: Call yourself lucky that they even bothered to attempt to support FreeBSD
-
cockliuser[m]
Siren[m]: You live under a rock then :)
-
cockliuser[m]
Stnby[m]: That wasn't made for BSD, mr sperg
-
cockliuser[m]
It's a general security feature
-
Stnby[m]
To run a daemon as root?
-
cockliuser[m]
Stnby[m]: No, to drop privileges
-
Stnby[m]
I call a security feature being able to run it as any user I want. It does not need to drop privileges if it does not even need them to begin with
-
cockliuser[m]
After you drop privileges, the program is not root by any sense
-
Stnby[m]
And I am talking about Linux here
-
Stnby[m]
No one cares about your Free BSD
-
Stnby[m]
cockliuser[m]: What if it has done the damage before it decides to drop lol
-
cockliuser[m]
Stnby[m]: And people wanted the webserver to support it. It doesn't without cap configuration
-
Stnby[m]
cockliuser[m]: Too bad for you
-
cockliuser[m]
Stnby[m]: The source code is public
-
Siren[m]
Siren[m]: you have 3 options instead of crying about your cuck license OS:
-
Siren[m]
1. patch the program to add the said features that you need for compatibility
-
Siren[m]
2. find a work around (you're not capable hence you didn't even know that it was possible to have SSL/TLS on a non standard port but I promise you that a firewall rule to forward traffic would work in your case).
-
Siren[m]
3. get a better OS
-
cockliuser[m]
Stnby[m]: The webserver is run as root by default
-
cockliuser[m]
Go argue with them
-
apotheon
08:57 < Stnby[m]> cockliuser[m]: Get a real OS even your shitty macos has no low port limitation
-
cockliuser[m]
Caddy
-
Siren[m]
No, we don't care
-
apotheon
It seems odd to me to call a system that has security controls on high value ports "shitty" because of it.
-
Stnby[m]
cockliuser[m]: Your ass is public. Its apache2 licensed caddy we are talikng about and BSD does not force to publish your code either
-
cockliuser[m]
Siren[m]: Obviously lmao
-
Siren[m]
either implement the feature, the API or a patch for caddy and maintain it
-
Siren[m]
you don't need to cry
-
Siren[m]
that's what some linux distros do even, maintaining patched versions
-
cockliuser[m]
cockliuser[m]: Lol imagine arguing for caps to return to "lol just run it as root"
-
Siren[m]
it's a normal thing, again
-
cockliuser[m]
Room temperature IQ argument
-
apotheon
"implement [. . .] the API" = "throw out the current security capabilities system and replace it with the system from another OS"
-
apotheon
wtf
-
cockliuser[m]
Siren[m]: I don't and will never use caddy
-
cockliuser[m]
Shit software doesn't deserve adoption
-
Stnby[m]
cockliuser[m]: I 100% agree
-
Siren[m]
apotheon: you don't need to fully replace it, add a compatibility layer or just implement what's missing. even if you don't wanna deal with caps, you have the other two options.
-
Stnby[m]
One of the reasons why FreeBSD is pretty dead
-
cockliuser[m]
Stnby[m]: we're not even talking about freebsd here
-
cockliuser[m]
Are you on some bad lsd?
-
Siren[m]
cockliuser[m]: ever seen a bsd conference? :))
-
cockliuser[m]
yea
-
Stnby[m]
cockliuser[m]: The issue you are having is FreeBSD specific.
-
cockliuser[m]
Stnby[m]: No, any os which doesn't support linux caps
-
Stnby[m]
caps are ultimately more secure than dropping privileges from root
-
cockliuser[m]
Have you been reading the conversation?
-
cockliuser[m]
or not
-
Stnby[m]
Once in a while. It did not seem to progress anywhere. And I am working at the same time as well
-
Siren[m]
cockliuser[m]: yes but you have other options than crying to devs about a missing feature and calling it a bug
-
Siren[m]
which it isn't
-
Siren[m]
just roll your patch for it
-
cockliuser[m]
Stnby[m]: If you have the source code of a program, and you verify that it binds to the ports then drops privs, it's inherently much more secure than caps
-
Siren[m]
or use a firewall like I said
-
apotheon
Siren[m]: some people don't want 80 metric tons of extra stuff on top of a system that works fine when you actually use it
-
cockliuser[m]
With a cap you have the ability to bind to any privileged port at any time
-
Stnby[m]
cockliuser[m]: How often do you have the source code of a FreeBSD distro with its software bundle?
-
Siren[m]
apotheon: then patch caddy or use a fw
-
apotheon
especially because of a fundamental problem of security capabilities systems:
-
Siren[m]
as simple as that
-
Stnby[m]
Stnby[m]: 0.0000001% of the time?
-
cockliuser[m]
Stnby[m]: I'm not using FreeBSD ;)
-
apotheon
The whole idea of security capabilities is not specified in a way that requires any kind of ability to actually be sure that some similar operation with one can even be expressed the same way on another, so that an API wrapper is functionally impossible to fully implement.
-
cockliuser[m]
cockliuser[m]: even if I was, I wouldn't be running an unverified binary as root
-
cockliuser[m]
Anyway I'm going to exit this, arguing with software maxis is worthless
-
Stnby[m]
Send them a MR they will probably add the setuid/setgid feature. It requires CGO so its debatable if they would merge it tho.
-
Siren[m]
not worth it
-
Stnby[m]
It seems like 20-30min job to add this
-
Siren[m]
CGO would break even more compatibility
-
Siren[m]
but bsd people can do that
-
Siren[m]
it's not that unusual to maintain their own patched version
-
Siren[m]
even better if that's easy to add
-
cockliuser[m]
Linux maxis are as bad as, if not worse compared to Bitcoin maxis
-
Stnby[m]
All you need is
-
Stnby[m]
C.setgid(C.__gid_t(gid))
-
Stnby[m]
C.setuid(C.__uid_t(uid))
-
Stnby[m]
And obviously error handling
-
Stnby[m]
-
cockliuser[m]
🫡
-
apotheon
ut-oh, a "full message" link thing
-
cockliuser[m]
apotheon: Salute emoji
-
apotheon
I was talking about this:
-
apotheon
-
Stnby[m]
Oh there is a wrapper around this already
-
Stnby[m]
-
cockliuser[m]
apotheon: Oh that's a code snippet
-
apotheon
okay
-
apotheon
cool
-
Stnby[m]
Yeah use a syscall package, this way cgo is optional, which is a lot better
-
Steven_M
Hi, I was connected to a remote node using the command: set_daemon <host>:<port> trusted. The client output the following "Warning: connecting to a non-local daemon without SSL, passive adversaries will be able to spy on you." However, when I run the status command, the output was: "Refreshed 2805793/2805794, syncing, daemon RPC v3.10, SSL". So I'm confused. Was the connection between my wallet and the remote node, using SSL or not?
-
Steven_M
sorry, I think my post was chopped off, I'll shorten it and resend.
-
Steven_M
Hi, I was connected to a remote node using: set_daemon <host>:<port> trusted. The wallet output: "Warning: connecting to a non-local daemon without SSL, passive adversaries will be able to spy on you." However, when I ran "status", the output was: "Refreshed 2805793/2805794, syncing, daemon RPC v3.10, SSL". So I'm confused. Was the connection between my wallet and the remote node, using SSL or not?
-
cockliuser[m]
I think it's because you didn't use https:// in the url
-
cockliuser[m]
That's what I can gather from simplewallet.cpp
-
cockliuser[m]
<Steven_M> "Hi, I was connected to a..." <- Try running set_daemon https://<host>:<port>
-
cockliuser[m]
* Try running set_daemon https://\<host>:\<port>
-
sgp[m]
-
Steven_M
cockliuser[m]: That worked perfectly, thanks so much! :-)